Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,668,090 papers from all fields of science
Search
Sign In
Create Free Account
Deniable authentication
Known as:
Repudiability (cryptography)
, Repudiation (cryptography)
In cryptography, deniable authentication refers to message authentication between a set of participants where the participants themselves can be…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Cryptographic hash function
Cryptography
Deniable encryption
Malleability (cryptography)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
How Reliable is Your Workflow: Monitoring Decay in Scholarly Publications
José Manuél Gómez-Pérez
,
Esteban García-Cuesta
,
Jun Zhao
,
Aleix Garrido
,
J. E. Ruiz
SePublica
2013
Corpus ID: 15206364
Scientific workflows play an important role in computational research, as the essential artifacts for communicating the methods…
Expand
2010
2010
Robust Deniable Authentication Protocol
Eunjun Yoon
,
K. Yoo
,
Sang-Soo Yeo
,
Changhoon Lee
Wireless personal communications
2010
Corpus ID: 38337982
Deniable authentication protocol is a new technique of modern cryptography. The protocol not only enables an intended receiver to…
Expand
2009
2009
Incorporating accountability into internet email
Wayne W. Liu
,
S. Aggarwal
,
Z. Duan
ACM Symposium on Applied Computing
2009
Corpus ID: 15633772
Email used to be the "number one killer application" of the Internet. However, misuse and abuse such as spam, phishing, and…
Expand
2008
2008
An Enhanced Deniable Authentication Protocol
Gang Li
,
Xiangjun Xin
,
Wei Li
International Conference on Computational…
2008
Corpus ID: 17867089
A deniable authentication can be used to provide secure negotiation on the Internet. Although many deniable authentication…
Expand
2007
2007
A novel deniable authentication protocol
Liu Zhe-feng
2007
Corpus ID: 63689675
Deniable authentication protocol was studied in this paper.Based on the intractability of discrete logarithm problem and secure…
Expand
2006
2006
A ID-Based Deniable Authentication Protocol on pairings
Jue-Sam Chou
,
Yalin Chen
,
Jin-Cheng Huang
IACR Cryptology ePrint Archive
2006
Corpus ID: 239098
Tel: 886+(0)5-2721001 ext.2017 Abstract Recently, Yoon et al. and Cao et al. propose two deniable authentication protocols…
Expand
2005
2005
Deniable Authentication with RSA and Multicasting
Daniel R. L. Brown
IACR Cryptology ePrint Archive
2005
Corpus ID: 2291463
A deniable authentication scheme using RSA is described and proven secure in the random oracle model. A countermeasure to a well…
Expand
2005
2005
Efficient non-interactive deniable authentication protocols
Hai-feng Qian
,
Z. Cao
,
Licheng Wang
,
Qingshui Xue
International Conference on Computer and…
2005
Corpus ID: 18132560
Deniable authentication protocol is an authentication protocol that allows a sender to authenticate a message for a receiver, in…
Expand
Review
2004
Review
2004
Mitigating Insider Threats to RSA Key Generation
Adam L. Young
,
Naveen Sastry
,
+4 authors
Kaisa Nyberg
2004
Corpus ID: 16090845
RSA keys form the cornerstone for numerous security systems. They provide for confidentiality of communications as well as non…
Expand
Highly Cited
2002
Highly Cited
2002
Deniable Authentication Protocol Based on Diffie-Hellman Algorithm
Chongxiang Xu
2002
Corpus ID: 63399462
A deniable authentication protocol is proposed in this paper. This protocol can resist person-in-the-middle(PIM) attack, assure…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE